The document provides a scheme of work for Form 4 students covering topics in Information and Communication Technology for the year 2015. It outlines 3 main topics that will be covered: 1) Information Technology and Society, 2) Computer Systems, and 3) Computer Networks and Communications. For each topic, it lists the specific sub-topics to be discussed, proposed learning outcomes, suggested hands-on activities and assessments. The topics range from introductions to IT, computer ethics and security, to hardware, software, networks and communications. A variety of teaching methods like group discussions and research will be employed to engage the students. Formal assessments include portfolios, tests and a school assessment to evaluate student understanding.
This document provides a yearly plan for teaching Information and Communication Technology (ICT) to Form 4 students in 2014 at SMK DENGKIL, SEPANG, Malaysia. It outlines the topics to be covered each month from January to November 2014, the associated learning outcomes, and suggested teaching activities. The plan covers four main areas: 1) Information Technology and Society, 2) Computer Systems, 3) Computer Networks and Communications, and 4) Current and Future Developments. It aims to equip students with knowledge and skills in areas such as computer ethics, security, hardware, software, networking basics, and emerging technologies through classroom instruction and hands-on activities over the course of the academic year.
Role of IT in Research: How to improve productivity of Research ProcessSHARAD JAMBUKAR
Research is nothing but satisfying the quest. While pursuing a typical research process, lot of time is spent on non value adding activities and this study guides you on how IT can simplify and expedite the research.
The Concept of ICT and its Related TerminilogiesAdjeiKwadjo
This write up teaches the reader to understand the general concept of Information Communication Technology (ICT), highlighting its categories and some relevant applications
This document outlines topics related to computer networks and communications. It covers basic concepts such as defining networks and communications, types of networks including LAN, MAN and WAN, network architectures like client/server and peer-to-peer, and network topologies including bus, ring and star. The document also discusses hardware requirements for networking including devices like NICs, modems, hubs and routers, as well as cabling and wireless transmission media. Software requirements cover network operating systems and client software. Additional sections provide information on setting up network facilities and current/future developments in networking technology.
Microsoft Word and OpenOffice Writer are word processing software that provide basic functions like typing, formatting text, and checking spelling errors. They also include advanced features like mail merge, drop caps, and watermarks.
Mail merge allows users to create multiple customized documents from a main document and a data source. Drop caps make the first letter of a paragraph larger for styling. Watermarks add overlaying text or images to documents.
Microsoft Excel and OpenOffice Calc are spreadsheet software that organize data in rows and columns and perform calculations. Advanced features include macros, lookup functions, protection of worksheets, and pivot tables. Macros automate tasks, lookup functions find values in tables, protection prevents changes, and pivot tables summarize
RAM and ROM are the two types of primary storage in a computer. RAM, or random-access memory, allows both reading and writing of data and programs, making it the working memory. ROM, or read-only memory, only allows reading of permanently stored data and programs. Primary storage refers to the internal memory of a computer that can be directly accessed by the processor.
A computer network connects multiple computers and devices to allow sharing of resources and communication between users. There are three main types of networks - local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs cover small physical areas like a home or office building. MANs encompass larger areas like a city. WANs have the largest geographical reach such as between countries. Common network architectures include client-server, where file storage and services are centralized on server computers, and peer-to-peer where computers directly share files and resources without a central server.
This document provides a yearly plan for teaching Information and Communication Technology (ICT) to Form 4 students in 2014 at SMK DENGKIL, SEPANG, Malaysia. It outlines the topics to be covered each month from January to November 2014, the associated learning outcomes, and suggested teaching activities. The plan covers four main areas: 1) Information Technology and Society, 2) Computer Systems, 3) Computer Networks and Communications, and 4) Current and Future Developments. It aims to equip students with knowledge and skills in areas such as computer ethics, security, hardware, software, networking basics, and emerging technologies through classroom instruction and hands-on activities over the course of the academic year.
Role of IT in Research: How to improve productivity of Research ProcessSHARAD JAMBUKAR
Research is nothing but satisfying the quest. While pursuing a typical research process, lot of time is spent on non value adding activities and this study guides you on how IT can simplify and expedite the research.
The Concept of ICT and its Related TerminilogiesAdjeiKwadjo
This write up teaches the reader to understand the general concept of Information Communication Technology (ICT), highlighting its categories and some relevant applications
This document outlines topics related to computer networks and communications. It covers basic concepts such as defining networks and communications, types of networks including LAN, MAN and WAN, network architectures like client/server and peer-to-peer, and network topologies including bus, ring and star. The document also discusses hardware requirements for networking including devices like NICs, modems, hubs and routers, as well as cabling and wireless transmission media. Software requirements cover network operating systems and client software. Additional sections provide information on setting up network facilities and current/future developments in networking technology.
Microsoft Word and OpenOffice Writer are word processing software that provide basic functions like typing, formatting text, and checking spelling errors. They also include advanced features like mail merge, drop caps, and watermarks.
Mail merge allows users to create multiple customized documents from a main document and a data source. Drop caps make the first letter of a paragraph larger for styling. Watermarks add overlaying text or images to documents.
Microsoft Excel and OpenOffice Calc are spreadsheet software that organize data in rows and columns and perform calculations. Advanced features include macros, lookup functions, protection of worksheets, and pivot tables. Macros automate tasks, lookup functions find values in tables, protection prevents changes, and pivot tables summarize
RAM and ROM are the two types of primary storage in a computer. RAM, or random-access memory, allows both reading and writing of data and programs, making it the working memory. ROM, or read-only memory, only allows reading of permanently stored data and programs. Primary storage refers to the internal memory of a computer that can be directly accessed by the processor.
A computer network connects multiple computers and devices to allow sharing of resources and communication between users. There are three main types of networks - local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs cover small physical areas like a home or office building. MANs encompass larger areas like a city. WANs have the largest geographical reach such as between countries. Common network architectures include client-server, where file storage and services are centralized on server computers, and peer-to-peer where computers directly share files and resources without a central server.
RPH BAB 3 RANGKAIAN KOMPUTER DAN KOMUNIKASI Cikgu Comel
Rangkasan singkat dokumen tersebut adalah sebagai berikut:
1. Rancangan pengajaran harian mata pelajaran Teknologi Maklumat dan Komunikasi membahas tentang konsep dasar rangkaian komputer dan komunikasi.
2. Pelajaran tersebut meliputi definisi rangkaian komputer dan komunikasi, kepentingan rangkaian komputer, dan jenis-jenis rangkaian komputer.
3. Metode pengajaran yang digunakan antara lain penerangan, disk
This document provides information about different types of physical transmission media. It discusses three main types of cables used for physical transmission: twisted-pair cable, coaxial cable, and fiber optic cable. Twisted-pair cable consists of two insulated copper wires twisted together, which helps cancel out electromagnetic interference. Coaxial cable contains a central conducting core surrounded by a metal shield. Fiber optic cable uses glass fibers to transmit data via laser signals. The document also mentions that cables are a common physical transmission medium used in Ethernet and token ring local area networks.
The document provides a scheme of work for teaching Information and Communication Technology (ICT) to Form 4 students in Malaysia. It outlines the topics to be covered each month, including: 1) Information Technology and Society, discussing ethics, privacy and security; 2) Computer Systems, covering hardware, software and installation; and 3) Computer Networks and Communications, focusing on networking concepts, hardware, software and practical skills. The learning outcomes, suggested activities and notes for teachers are also included to support lesson planning and delivery for each topic.
This document provides a scheme of work for an ICT course for Form 4 students. It outlines topics to be covered over 33 weeks, including introduction to information technology and society, computer systems, and computer networks and communications. Key topics include computer ethics, hardware components, software types, network concepts, and physical transmission media. The schedule specifies learning outcomes, suggested hands-on activities, and assessment points for each topic block.
This document outlines the scheme of work for the Form 4 Information and Communication Technology (ICT) course at SMKBBB for the 2013 year. It is divided into 3 main topics covered over 42 weeks:
1) Information Technology and Society - Covering computer ethics, privacy, computer security, and the impact of ICT on society. Assessments include a presentation on the impact of ICT.
2) Computer Systems - Covering computer hardware and software components, installation, and current technologies. Students will assemble a PC and install operating systems.
3) Computer Networks and Communications - Covering networking concepts, hardware, software, and setting up a local area network. Students will install network cards and crimp
This document provides an introduction to computer networks and networking concepts. It discusses network structures including local area networks (LANs) and wide area networks (WANs). It then introduces network architecture and the layered protocol model, using the OSI reference model as an example. It describes how networks are structured into layers that communicate with peer layers on other machines. The document also provides an overview of network services and the TCP/IP protocol suite.
The document provides a scheme of work for teaching ICT literacy to secondary school students in Form 1. It outlines 16 weeks of lessons covering topics like computer lab management, computer hardware, and computer software. Each week focuses on specific learning areas and outcomes, and suggests hands-on learning activities. The goal is to teach students proper computer use, ethics, and basic maintenance, while inculcating values such as responsibility and cooperation.
The document outlines the teaching and evaluation scheme for the 4th semester Information Technology program for the year 2019-20. It includes details of the subjects, periods per week, internal and end semester assessments.
There are 4 theory subjects - Operating System, Data Communication and Computer Networks, Microprocessor & Microcontroller, and Database Management System. There are also 4 practical subjects with labs. The total periods per week are 17 theory and 22 practical. Students will be evaluated through internal assessments, sessional exams, and end semester exams. The minimum pass marks are 35% for theory, 50% for practical, and 40% overall.
This document contains a scheme of work for Form 4 Information and Communication Technology (ICT) at SMJK Chio Min for 2016. It outlines 32 weeks of topics, learning outcomes, and suggested activities. The topics covered include introduction to ICT, computer systems, computer networks and communications, and current and future technologies. Learning outcomes focus on defining key terms, explaining concepts, and applying skills like assembling computer components and setting up basic networks. Suggested activities include individual and group tasks, hands-on exercises, research projects and slide presentations. Formal exams are scheduled for weeks 10, 20-21, and 27.
The document provides information about a workshop on Computer Practice from N4 to N6. It introduces the presenter, Bertie Buitendag, and outlines the following:
- An overview of the Computer Practice curriculum from N4 to N6.
- A focus on the introductory level (N4) course.
- Details on assessments and examinations (ICASS).
- Teaching time and course offerings.
- Resources available for lecturers and teachers.
This document provides an overview of the content that will be covered in the SPM 1012: Telecommunication and Networking course. The course will introduce students to technologies and devices used for computer networking and internet access. Key topics that will be covered include fundamentals of data communication, telecommunication facilities, network topology, internet technology and applications, and social and ethical issues related to web resources. Students will learn about hardware, software, data, procedures, communication methods, and people involved in computer and telecommunication systems. Assignments include developing a basic website and a report on networking setup in a school. Student learning outcomes, assessment methods, and course grading are also outlined.
This document provides information about laboratory work on hardware and computer systems. It includes learning objectives, key questions, and tasks. The learning objectives are to discuss computer hardware, classify hardware by usage, and identify PC ports. Key questions cover topics like the CPU, computer memory, storage, and port types. Tasks involve reading theory, answering questions, labeling diagrams of computer components, and identifying hardware as main or peripheral. The document aims to give students a brief introduction to computer hardware architecture.
Automatic Classification of Springer Nature Proceedings with Smart Topic MinerFrancesco Osborne
The document summarizes research on automatically classifying Springer Nature proceedings using the Smart Topic Miner (STM). STM extracts topics from publications, maps them to a computer science ontology, selects relevant topics using a greedy algorithm, and infers tags. It was tested on 8 Springer Nature editors who found STM accurately classified 75-90% of proceedings and improved their work. However, STM is currently limited to computer science and occasional noisy results were found in books with few chapters. Future work aims to expand STM to characterize topic evolution over time and directly support author tagging.
Design and computer architecture: Design a processor with minimum number of instructions, so that it can do the basic arithmetic and logic operations.
Design a serial interface to connect the 8085 microprocessor with a keyboard for that on pressing of enter key of keyboard, it can receive the characters typed.
Design and pipeline architecture for 2,3,4 stages pipeline.
Using microprogram as instructions directly: Consider that there is no "instruction set", no program counter (but microprogram counter), no instruction fetch in the normal sense. Your machine and "program" is THE microprogram itself. You have to add some fields into microprogram word such as : ADD R0, R1, R2 which hold the appropriate values.
Give a comparative study of 8085, 6502, and NSC micro-processors
Design a Turing machine using java, to implement basic operations of TM.
Write program to generate assembly code from prefix code.
Simulate a word multiplier.
Simulate a word divider.
Suggest a high speed addition method and logic for 4-bit addition.
Microprocessor-based automatic door opener.
Microprocessor based furnace temperature controller.
Microprocessor based water level controller in domestic water storage tank (when water goes above a height, it switches off the pump motor, and when it goes below some level, it switches ON the pump motor).
Microprocessor based automatic attendance recorder (make use of RFID: a unique for each student).
Microprocessor based ECG recorder.
Design and implement an arbitrary precision four function calculator.
Stack machine ISA : Design a stack machine, its instruction set must be stack oriented (no register!).
Implement quick sort using 8085 assembly language.
Implement binary search using 8085 assembly language.
Implement matrix multiplication using 8085 assembly language.
Design a instruction set for a limited functionality machine having all instructions of 8-bits fixed length only, incl
This document contains information related to a Networks Laboratory course, including the lab manual, program objectives, outcomes, syllabus, and index. It provides:
1) An overview of the course contents, objectives to learn network commands, socket programming, analyze protocols, and use simulation tools.
2) Details on the program outcomes which focus on applying technical knowledge, lifelong learning, research, and total quality education.
3) A list of 12 experiments that will be conducted in the lab, including implementing various protocols using sockets and simulating protocols using a network simulator.
4) An index table to record details of experiments conducted like date, topic, outcomes and marks.
1) The document outlines the syllabus structure and course details for the M.E. (Computer Science and Engineering) Part II program at Solapur University.
2) The program spans four semesters and includes courses in self-learning, labs, and a dissertation project. In semester III, students complete a self-learning course, lab practice, and begin work on their dissertation by submitting a synopsis and progress report.
3) In semester IV, students continue dissertation work by submitting additional progress reports and presentations. They conclude the program by submitting a final dissertation report and presenting their work and defending it during a viva voce exam.
RPH BAB 3 RANGKAIAN KOMPUTER DAN KOMUNIKASI Cikgu Comel
Rangkasan singkat dokumen tersebut adalah sebagai berikut:
1. Rancangan pengajaran harian mata pelajaran Teknologi Maklumat dan Komunikasi membahas tentang konsep dasar rangkaian komputer dan komunikasi.
2. Pelajaran tersebut meliputi definisi rangkaian komputer dan komunikasi, kepentingan rangkaian komputer, dan jenis-jenis rangkaian komputer.
3. Metode pengajaran yang digunakan antara lain penerangan, disk
This document provides information about different types of physical transmission media. It discusses three main types of cables used for physical transmission: twisted-pair cable, coaxial cable, and fiber optic cable. Twisted-pair cable consists of two insulated copper wires twisted together, which helps cancel out electromagnetic interference. Coaxial cable contains a central conducting core surrounded by a metal shield. Fiber optic cable uses glass fibers to transmit data via laser signals. The document also mentions that cables are a common physical transmission medium used in Ethernet and token ring local area networks.
The document provides a scheme of work for teaching Information and Communication Technology (ICT) to Form 4 students in Malaysia. It outlines the topics to be covered each month, including: 1) Information Technology and Society, discussing ethics, privacy and security; 2) Computer Systems, covering hardware, software and installation; and 3) Computer Networks and Communications, focusing on networking concepts, hardware, software and practical skills. The learning outcomes, suggested activities and notes for teachers are also included to support lesson planning and delivery for each topic.
This document provides a scheme of work for an ICT course for Form 4 students. It outlines topics to be covered over 33 weeks, including introduction to information technology and society, computer systems, and computer networks and communications. Key topics include computer ethics, hardware components, software types, network concepts, and physical transmission media. The schedule specifies learning outcomes, suggested hands-on activities, and assessment points for each topic block.
This document outlines the scheme of work for the Form 4 Information and Communication Technology (ICT) course at SMKBBB for the 2013 year. It is divided into 3 main topics covered over 42 weeks:
1) Information Technology and Society - Covering computer ethics, privacy, computer security, and the impact of ICT on society. Assessments include a presentation on the impact of ICT.
2) Computer Systems - Covering computer hardware and software components, installation, and current technologies. Students will assemble a PC and install operating systems.
3) Computer Networks and Communications - Covering networking concepts, hardware, software, and setting up a local area network. Students will install network cards and crimp
This document provides an introduction to computer networks and networking concepts. It discusses network structures including local area networks (LANs) and wide area networks (WANs). It then introduces network architecture and the layered protocol model, using the OSI reference model as an example. It describes how networks are structured into layers that communicate with peer layers on other machines. The document also provides an overview of network services and the TCP/IP protocol suite.
The document provides a scheme of work for teaching ICT literacy to secondary school students in Form 1. It outlines 16 weeks of lessons covering topics like computer lab management, computer hardware, and computer software. Each week focuses on specific learning areas and outcomes, and suggests hands-on learning activities. The goal is to teach students proper computer use, ethics, and basic maintenance, while inculcating values such as responsibility and cooperation.
The document outlines the teaching and evaluation scheme for the 4th semester Information Technology program for the year 2019-20. It includes details of the subjects, periods per week, internal and end semester assessments.
There are 4 theory subjects - Operating System, Data Communication and Computer Networks, Microprocessor & Microcontroller, and Database Management System. There are also 4 practical subjects with labs. The total periods per week are 17 theory and 22 practical. Students will be evaluated through internal assessments, sessional exams, and end semester exams. The minimum pass marks are 35% for theory, 50% for practical, and 40% overall.
This document contains a scheme of work for Form 4 Information and Communication Technology (ICT) at SMJK Chio Min for 2016. It outlines 32 weeks of topics, learning outcomes, and suggested activities. The topics covered include introduction to ICT, computer systems, computer networks and communications, and current and future technologies. Learning outcomes focus on defining key terms, explaining concepts, and applying skills like assembling computer components and setting up basic networks. Suggested activities include individual and group tasks, hands-on exercises, research projects and slide presentations. Formal exams are scheduled for weeks 10, 20-21, and 27.
The document provides information about a workshop on Computer Practice from N4 to N6. It introduces the presenter, Bertie Buitendag, and outlines the following:
- An overview of the Computer Practice curriculum from N4 to N6.
- A focus on the introductory level (N4) course.
- Details on assessments and examinations (ICASS).
- Teaching time and course offerings.
- Resources available for lecturers and teachers.
This document provides an overview of the content that will be covered in the SPM 1012: Telecommunication and Networking course. The course will introduce students to technologies and devices used for computer networking and internet access. Key topics that will be covered include fundamentals of data communication, telecommunication facilities, network topology, internet technology and applications, and social and ethical issues related to web resources. Students will learn about hardware, software, data, procedures, communication methods, and people involved in computer and telecommunication systems. Assignments include developing a basic website and a report on networking setup in a school. Student learning outcomes, assessment methods, and course grading are also outlined.
This document provides information about laboratory work on hardware and computer systems. It includes learning objectives, key questions, and tasks. The learning objectives are to discuss computer hardware, classify hardware by usage, and identify PC ports. Key questions cover topics like the CPU, computer memory, storage, and port types. Tasks involve reading theory, answering questions, labeling diagrams of computer components, and identifying hardware as main or peripheral. The document aims to give students a brief introduction to computer hardware architecture.
Automatic Classification of Springer Nature Proceedings with Smart Topic MinerFrancesco Osborne
The document summarizes research on automatically classifying Springer Nature proceedings using the Smart Topic Miner (STM). STM extracts topics from publications, maps them to a computer science ontology, selects relevant topics using a greedy algorithm, and infers tags. It was tested on 8 Springer Nature editors who found STM accurately classified 75-90% of proceedings and improved their work. However, STM is currently limited to computer science and occasional noisy results were found in books with few chapters. Future work aims to expand STM to characterize topic evolution over time and directly support author tagging.
Design and computer architecture: Design a processor with minimum number of instructions, so that it can do the basic arithmetic and logic operations.
Design a serial interface to connect the 8085 microprocessor with a keyboard for that on pressing of enter key of keyboard, it can receive the characters typed.
Design and pipeline architecture for 2,3,4 stages pipeline.
Using microprogram as instructions directly: Consider that there is no "instruction set", no program counter (but microprogram counter), no instruction fetch in the normal sense. Your machine and "program" is THE microprogram itself. You have to add some fields into microprogram word such as : ADD R0, R1, R2 which hold the appropriate values.
Give a comparative study of 8085, 6502, and NSC micro-processors
Design a Turing machine using java, to implement basic operations of TM.
Write program to generate assembly code from prefix code.
Simulate a word multiplier.
Simulate a word divider.
Suggest a high speed addition method and logic for 4-bit addition.
Microprocessor-based automatic door opener.
Microprocessor based furnace temperature controller.
Microprocessor based water level controller in domestic water storage tank (when water goes above a height, it switches off the pump motor, and when it goes below some level, it switches ON the pump motor).
Microprocessor based automatic attendance recorder (make use of RFID: a unique for each student).
Microprocessor based ECG recorder.
Design and implement an arbitrary precision four function calculator.
Stack machine ISA : Design a stack machine, its instruction set must be stack oriented (no register!).
Implement quick sort using 8085 assembly language.
Implement binary search using 8085 assembly language.
Implement matrix multiplication using 8085 assembly language.
Design a instruction set for a limited functionality machine having all instructions of 8-bits fixed length only, incl
This document contains information related to a Networks Laboratory course, including the lab manual, program objectives, outcomes, syllabus, and index. It provides:
1) An overview of the course contents, objectives to learn network commands, socket programming, analyze protocols, and use simulation tools.
2) Details on the program outcomes which focus on applying technical knowledge, lifelong learning, research, and total quality education.
3) A list of 12 experiments that will be conducted in the lab, including implementing various protocols using sockets and simulating protocols using a network simulator.
4) An index table to record details of experiments conducted like date, topic, outcomes and marks.
1) The document outlines the syllabus structure and course details for the M.E. (Computer Science and Engineering) Part II program at Solapur University.
2) The program spans four semesters and includes courses in self-learning, labs, and a dissertation project. In semester III, students complete a self-learning course, lab practice, and begin work on their dissertation by submitting a synopsis and progress report.
3) In semester IV, students continue dissertation work by submitting additional progress reports and presentations. They conclude the program by submitting a final dissertation report and presenting their work and defending it during a viva voce exam.
The document outlines the syllabus structure and course details for the M.E. (Computer Science and Engineering) Part II program at Solapur University. The program spans four semesters. Semester III includes courses in self-learning, lab practice, and dissertation phase I and II. Semester IV focuses on completing the dissertation phase III and IV, including a final presentation and viva-voce defense. Assessment includes in-semester and end-semester evaluation of theory courses, lab work, dissertation progress reports, and a final defense. The program provides advanced learning in areas like big data, open source technologies, and network administration.
COA RKGITM #sem education purpose ppt good for studentmohitmehra75
This document provides information about a computer organization and architecture course being taught by Dr. Sharmila. It includes details about the faculty member, the course syllabus and units, evaluation scheme, course objectives and outcomes, and program outcomes. Dr. Sharmila has over 14 years of teaching experience and research interests in wireless sensor networks, digital image processing, cryptography, and blockchain. The course covers topics like computer components and operation, arithmetic logic unit design, memory organization, input/output interfaces, and instruction execution stages of a processor. Students will learn about register transfer logic, addressing modes, and serial communication techniques.
This document provides a syllabus for the course IT4504 - Data Communication and Networks. The course is designed to provide an introduction to fundamental concepts of data communication and computer networks. It will cover topics such as network components, transmission mechanisms, architectures, protocols, local area networks and practical aspects of networking. Students will learn about network design, configuration, management and security. The course involves online learning materials, assignments and a final exam. It aims to equip students with skills to identify communication system components, propose appropriate network technologies, and describe technical issues related to wide area networks and network security.
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
This document presents an ontology for exploring knowledge in computer networks that was developed using OWL format. Over 500 concepts related to various aspects of computer networks like scope, scale, topology, etc. were identified and classified. Relationships between concepts were analyzed and over 550 relationships between 33 types of relationships were identified. The ontology was implemented using the Protege tool and can help users search for concepts in the computer networks domain on semantic web applications.
This document outlines the teaching and evaluation scheme for the 3rd semester Information Technology program for the 2019-20 academic year. It includes:
- A list of 5 theory subjects and their credit hours, internal assessment marks, end semester exam marks, and total marks.
- A list of 4 practical subjects and their lab hours, internal assessment marks, and total marks.
- The total credit hours, internal assessment marks, end semester exam marks, and grand total marks for the semester.
- Minimum passing marks requirements and details on student centered activities.
- An outline of the curriculum for the 3rd semester Diploma in Information Technology program.
Peripherals are additional devices that are attached to the computer they can be classified as input, output, input-output or network as discussed in the previous unit.
Ports offer standard connection points between the motherboard and external devices.
This document provides a scheme of work for Form 5 students studying Information and Communication Technology (ICT) at SMK Puchong Permai in 2015. It outlines the topics, learning outcomes, suggested activities, and assessment for the programming and multimedia modules over 10 and 9 weeks respectively. Key topics covered include basic programming concepts, program development, current programming languages, multimedia concepts, hardware and software, multimedia development, and current multimedia developments. Learning is assessed through individual and group tasks, as well as two school assessments and mid-year examinations. Suggested activities include research, presentations, project development and the use of thinking maps to demonstrate understanding.
Dokumen tersebut memberikan panduan penggunaan sistem pengurusan konten (CMS) bernama Joomla. Ia menerangkan ciri-ciri dan versi Joomla, panel administrator, pengurusan kandungan, menu, modul, komponen, template dan bahasa pengaturcaraan. Dokumen ini juga membincangkan panduan pembangunan laman web kerajaan mengikut pekeliling yang ditetapkan.
This document provides an overview of a basic programming and web course for Form 2 students. It introduces basic text, graphics, animations and tables in MS Word that can be saved as HTML files. It also covers just basic installation, introduction to basic structured programming applications, compiling, running and saving programs. The course concludes with hands-on practice.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
1. SMK PUCHONG PERMAI
INFORMATION AND COMMUNICATION TECHNOLOGY
SCHEME OF WORK 2015
FORM 4
1.0 INFORMATION TECHNOLOGY AND SOCIETY
MONTH
/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES i-Think
JAN.
WEEK
1
12/1 - 16/1
1.1 Introduction
to Information
Technology
(4 periods)
Learners should be able to:
1.1.1 Define Information
Technology in general.
1.1.2 Discuss the roles of IT in
everyday life:
o Education
o Banking
o Industry
o Commerce.
1. Students state the definition of
Information Technology in
general.
2. Group Activity:
- Discussing the roles
of IT in everyday life.
- Students cite an
example of a
technology used in
every day life.
3. Students adhere the rules and
regulations set for the ICT lab.
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
JAN
WEEK
2
19/1 - 23/1
1.2 Computer
Ethics and
Legal Issues
(8 periods)
1.2.1 Define Computer Ethics.
1.2.2 Identify the Code of
Ethics.
1.2.3 Define Intellectual
Property.
1.2.4 Define Privacy:
o authorised access
- user authentication
and verification
- Login (Personal
Identification
Numbers (PIN),
User Identification,
password)
- Biometrics
- physical control
1.2.5 Controversial contents and
control:
o Pornography
o Slander
o Filtering (Example :
NetNanny, CyberPatrol,
BlockNow)
1.2.6 Computer crime and Security
threats:
o Definition :
Computer
crime
Security
threats
o Examples of computer
crimes:
Fraud
identity fraud
credit card fraud
Copyright
infringement
unauthorized copy
unauthorized file sharing
Theft: data,
information,
equipment
Attacks:
Examples salami
attack, virus,
worms, hacking
1.2.7 Examples of Security threats
o malicious codes: e.g.
virus, Trojan horse,
worms, spy ware,
Phishing
o hacking: ethical
(hackers) and non-ethical
hacking (crackers)
o Natural/environmental:
e.g. fire and natural
disasters
o Theft : e.g. physical,
data, information
1.2.8 Cyber-law
1.2.1.1 Students explain Computer Ethics
and Code of Ethics.
1.2.1.2 Students describe Intellectual
Property and Privacy.
1.2.1.3 Students carry out research on
controversial contents and
control.
1.2.1.4 Students discuss computer crime
and Security threats.
1.2.1.5 Students carry out research on
Cyber Law and its importance.
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
2. JAN
WEEK
3
26/1 - 30/1
1.3 Computer
Security
(4 periods)
1.3.1 Define Computer
Security
1.3.2 State Security measures:
o data backup
o cryptography
1.3.3 encryption and decryption
o antivirus
o anti-spyware
o Firewall
o Human aspects :
awareness (policy,
training)
1.3.1.1 Students discuss the meaning of
Computer Security and its
measures.
1.3.1.2. Students describe encryption and
decryption.
1.3.1.2 Students carry out research on
topics:
- antivirus
- antti-spyware
- Firewall
- Policy and training of
computer security
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
FEB
WEEK
4 & 5
2/2 - 6/2
9/2 - 13/2
1.4 Research
(8 periods)
1.4.1 Impact of IT on society,
1.4.2 Copyright and Piracy
from the moral and legal
standpoint
1.4.3 Lack of security and its
effects in
industry/economy/
government.
1.4.4 Malaysian Cyber-law,
electronic government
law
1.4.1.1 Learners discuss the meaning of
Copyright and Piracy.
1.4.1.2 Learners list down the impact of
piracy activities from the
perspectives of:
- moral
- legal
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
FEB
WEEK
6
16/2 - 18/2
ICT ASSESSMENT 1 (PORTFOLIOS)
2.0 COMPUTER SYSTEM
MONTH/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
FEB
WEEK
7 & 8
23/2 - 27/2
02/3 - 06/3
2.1 System Concept
(6 periods)
Learners should be able to:
2.1.1 Overview of computer system
2.1.2 Data Representation:
o bit
o byte
o character
2.1.3 Introduction to Binary coding: ASCII
2.1.4 Data measurement:
o bit
o byte
o Kilobyte (KB)
o Megabyte (MB)
o Gigabyte (GB)
o Terabyte (TB)
2.1.5 Clock speed measurement:
o megahertz (MHz)
o gigahertz (GHz)
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
MARCH
WEEK
9
09/3 - 13/3
- UJIAN 1/Mac (T1,2,3,4,5&6A)
- SCHOOL ASSESSMENT 1
MARCH
WEEK MID-SEMESTER HOLIDAY 1
APRIL
WEEK
10 - 12
23/3 - 27/3
30/3 - 03/4
06/4 - 10/4
2.2 Hardware
(12 periods)
2.2.1 Input devices
2.2.2 Output devices
2.2.3 Motherboard:
o central processing unit (CPU)
o expansion slot
o expansion card
o RAM slot
o ports and connectors
2.2.4 Storage :
o primary storage (RAM/ROM)
o secondary storage (magnetic medium,
optical medium, flash memory card)
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
3. APRIL
WEEK
13
13/4 - 1/5
2.3 Software
(12 periods) 2.3.1 Operating System:
o platforms
o functions
o interfaces
2.3.2 Application Software: types and usage
(word processing, spreadsheet,
presentation, graphics)
2.3.3 Utility Program: types and usage (file
management, antivirus, diagnostic, file
compression)
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
2.3.4 Proprietary and open source software
MAY
WEEK
17
11/5 - 29/5
REVISION AND PPPA 1
LABOUR DAY AND WESAK DAY
MAY
WEEK 18
JUNE
WEEK 19
MID-YEAR HOLIDAY
( 30 MEI - 14 JUN )
JUNE
WEEK
20 - 22
15/6 - 3/7
22/6 – 26/6
29/6 – 3/7
2.4 Installation
(6 periods)
2.4.1 PC assembling
2.4.2 Hard disk partitioning and formatting
2.4.3 Software installation:
o operating system
o application software
o utility program
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
JUNE
WEEK
23
6/7 - 10/7
2.5 Current and
Future
Technologies
(4 periods)
2.5.1 Latest open source software available
JULY
WEEK
24
13/7 - 17/7
ICT ASSESSMENT 2 (PORTFOLIOS)
3.0 COMPUTER NETWORKS AND COMMUNICATIONS
MONTH/
WEEK
TOPICS AND
SCOPE
LEARNING OUTCOME SUGGESTED ACTIVITIES
JULY
WEEK
25
20/7 - 24/7
3.1 Basic
Concepts of
Networks
and
Communicati
ons
(6 periods)
Learners should be able to:
3.1.1 Define network
3.1.2 Define communication
Notes:
Network: To connect two
or more computers together
with the ability to
communicate with each
other
Communication: The
transmission of data from
one device to another
Discuss:
- file sharing
between
computers
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
4. 3.1.3 State the importance of network and
communication using examples in the
student’s immediate environment.
3.1.4 Define types of computer networks
Local Area Network (LAN)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
3.1.5 Differentiate between the three types of
computer networks
3.1.6 Define 2 types of network architecture
Client/Server
Peer-to-Peer
3.1.7 State three types of network topology
Bus
Ring
Star
3.1.8 Differentiate between the three types of
network topology
3.1.9 Define TCP/IP as the protocol to
facilitate communication over computer
network
3.1.10 State types of network communication
that use TCP/IP
Intranet
Internet
Extranet
3.1.11 Cooperation in conducting group research
- sending short
messages using
cellular services
Conduct group research
from Information sources
(library, the Internet)
examples:
1. Discovering
Computers,
Shelly Cashman
Series (ISBN 0-
619-25525-0)
2. http://www.webo
pedia.com
Notes:
LAN: A network that spans
a small area usually
confined to a single building
or a group of buildings
MAN: A network designed
for town and city usually
larger than Local-Area
Network
WAN: A network that spans
a relatively large
geographical area usually
consisting two or more
Local-Area Network.
Example: The Internet
Group activity:
Students list out the
differences between the
three types of computer
network
Conduct group research
from information sources
(library, the Internet) on
types of network
architecture
Notes:
Client/Server Architecture:
A network architecture in
which each computer or
process on the network is
either a client or a server
Peer-to-Peer Architecture:
A type of network in which
each workstation has
equivalent capabilities and
responsibilities
Conduct group research
from information sources
(library, the Internet) on
types of network topology
5. Students draw simple
diagram of the 3 types of
network topology
Students list out the
differences between the
three types of network
topology
Conduct group research
from information sources
(library, the Internet) on
TCP/IP
Conduct group research
from information sources
(library, the Internet)
examples:
1. Discovering
Computers,
Shelly Cashman
Series (ISBN 0-
619-25525-0)
2. http://www.webo
pedia.com
25/7 - 29/7
UJIAN SUMATIF 2 ( T1,2 & 4 )
AUGUST
WEEK
27 -28
31/7 - 14/8
3.2 Hardware
Requirements
(8 periods )
3.2.1 Identify the devices needed to establish
a computer network communication for
a client/server network organization
3.2.2 Describe the functions of the Network
Interface Card and hub
3.2.3 Identify various types of physical
transmission media/ cables such as
Unshielded Twisted Pair(UTP),
Shielded Twisted Pair(STP), Coaxial
Cable and Fiber Optic Cable
3.2.4 Identify various types of wireless
transmission media such as infrared,
radio wave and satellite
Students list down the
various network devices
Notes:
Network Devices:
Network Interface
Card (Ethernet
and Wi-Fi)
Modem (Internal
and External)
Hub, Switch,
Router
Wireless Access
Point
Students list down the
functions of the stated
devices
Notes:
Function of the Network
Interface Card: KIV
Function of Hub: KIV
Students list down various
types of cables
Students list down various
types of wireless
transmission media
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
AUGUST
WEEK
29
17/8 - 21/8
3.3 Software
Require-
ments
(4 periods )
3.3.1 Define Network Operating System
3.3.2 Name various Network Operating
System Software
Notes:
Network Operating System
(NOS): An operating
system that includes
functions for connecting
computers and devices
into a local-area network
(LAN). It has the
capabilities to coordinate
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
6. 3.3.3 State the functions of various client
software
web browser
email client
network utilities
network file manager
the activities of multiple
computers across a
network
Notes:
Examples: Windows 2000
Server, Windows NT,
LINUX, UNIX
Notes:
Examples:
Web Browsing:
Internet Explorer,
Mozilla Firefox and
Opera
Email Client:
Microsoft Outlook,
Mozilla
Thunderbird and
Eudora
Network Utilities:
Ping and
Traceroute
Network File
Manager: Network
Neighborhood and
My Network
Places
o Peta Pelbagai Alir
SEPT
WEEK
30 - 33
24/8 - 23/9
3.4 Setting
Network
Facilities
(12 periods )
3.4.1 Install network interface card
3.4.2 Setup the driver for the network card
3.4.3 Crimp and test UTP cable
Straight cable
Crossed cable
3.4.4 Configure the workstation to join a
Local-Area Network
Internet Protocol (IP) Address
Subnet Mask
Gateway
Hostname
3.4.5 Test the network connection
3.4.6 Create a shared folder
Activity:
Ping the server from the
configured workstation
Activity:
Set up a shared folder
Save a file in the shared
folder
Access the file in the
shared folder from other
workstations
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
7. CUTI PERTENGAHAN PENGGAL 2 (19 SEPT - 27 SEPT )
SEPT
WEEK
34 -35
28/9 - 9/10
3.5 Current and
Future
Develop-
ment
( 6 periods )
3.5.1 Describe:
Mobile Computing (specifications,
services, frequencies), or
Internet Technology and Services
(VOIP, BLOG), or
Types of network (PAN, VPN,
WLAN, WIMAX)
Activity:
Research on the chosen
topic
Write a short report (350
words) and save the
document in the shared
folder
i-THINK Maps
o Peta Bulat
o Peta Buih
o Peta Pokok
o Peta Buih
Berganda
o Peta Titi
o Peta Dakap
o Peta Alir
o Peta Pelbagai Alir
OCT
WEEK
36 - 41
12/10-13/11
REVISION
FINAL YEAR EXAM FORM 4
NOV
WEEK
37
SCHOOL HOLIDAY (21/11/15 - 3/1/2016)